Rançongiciel as a Service (RaaS), le nouveau virus de l’année 2021 ?

Ransomware as a Service (RaaS), the new virus of 2021?

The beginning of 2021 will be marked not by a wave, but by a large number of cyberattacks that will hit many organizations in France. For the past few years, the ANSSI (French National Cybersecurity Agency) has been warning companies and institutions about the resurgence of cyber viruses. In the CERT-FR Threats and Incidents report, it states a dramatic 255% increase in reports of ransomware attacks in 2020 and highlights Ransomware as a Service, RaaS, an emerging trend in the… Read More >>

Enjeux RH télétravail

HR issues of telework

While the democratization of telework concerns different departments within companies, Human Resources is probably, together with the IT Department, the department whose activity has been the most impacted by telework, with new HR issues arising from this digitalization of interactions. From 100% online recruitment processes to the need to maintain social contact between all employees remotely, and to manage the work/life balance, Human Resources must, more than ever, prove their ingenuity and rely on digital tools to support these new… Read More >>

usurpation d'identité

Identity theft: how to protect against it within companies?

Identity theft, which affects individuals in both personal and professional situations, is a threat whose impact is growing as the digital age expands in our lives. Although identity theft was not born with information technology, it is indeed the IT that has contributed to its expansion: on the one hand, more and more administrative procedures are carried out online, and on the other hand, our personal exchanges and confidential data are often poorly protected. Nevertheless, there are ways to protect… Read More >>

PAM-as-a-Service

PAM as a Service: Privileged Access Management for everyone?

The protection of information systems requires the deployment of a PAM (Privileged Access Management) solution for the surveillance of privileged users, which if deployed on-premise, may be too restrictive to implement for some organizations. In this context, PAM as a Service, or Privileged Access Management as a public cloud service, will be a guarantee of simplicity for the IT teams involved. From a deployment in a few clicks to the guarantee of regular and automatic updates, PAM as a Service… Read More >>

Teleworking: how to protect companies against the resurgence of cyber attacks

2020, already a difficult year from a health and economic point of view, will be a milestone in terms of cybercrime. Cyber attacks have multiplied, often exploiting vulnerabilities related to remote work. The first lockdown demonstrated the resilience of a large part of our companies, driven by dedicated IT teams whose sole objective was the impossible task of getting three million employees to telework… in just a few days. As a manager of a major French bank told me recently,… Read More >>

Réseau d’administration

Administration network: 6 risks addressed by PAM

Within any organization, there are several risks for the administration network: some have a high occurrence and are simple to deal with, others are rare but complex to handle. The use of a Privileged Access Management (PAM) solution allows to manage these risks by minimizing or even eliminating them. Administration network: protean risks The risks that arise on the administration network can be the result of deliberate acts but also due to errors or negligence. From the use of generic… Read More >>

Sécuriser le télétravail - secure teleworking

What measures should be implemented to secure teleworking?

Today, more than ever, the way organizations manage to secure teleworking has an impact on the overall security of information systems. Teleworking is no longer a project or a temporary exception; it is now strongly anchored in organizations’ practices and represents an additional challenge for IT departments: it is no longer a question of being able to secure the remote accesses of certain employees on a temporary basis, but rather of being able to secure the remote accesses to the… Read More >>

Comment sécuriser le BYOPC

How to secure the BYOPC?

Widely democratized in recent months due to the unexpected and massive lockdown caused by the first wave of the Covid-19 epidemic, the BYOPC (Bring Your Own PC) concept is now becoming a real issue for the IT departments of organizations. For them, this practice provides as many organizational solutions as it generates security issues for the information system. While it is generally not recommended to let employees use their personal computers to access their organization’s applications and resources, today there… Read More >>

flex office

After teleworking, are we heading towards a democratization of flex office?

While telework has widely developed in organizations in 2020 due to the Covid-19 pandemic, flex office now appears as the next logical step in the reorganization of workspaces. Regular teleworking (for example one or two days a week) promotes a reorganization of offices: for the same number of employees, fewer workstations are necessary within the organization’s premises. What is the flex office? The flex office concept means that there is no dedicated office for each employee. When they are on… Read More >>

User Behavior Analytics (UBA)

User Behavior Analytics (UBA): key applications for cybersecurity

While User Behavior Analytics (UBA) is not a new concept, its applications are multiplying as Machine Learning becomes more mature. By associating Machine Learning and Big Data, UBA updates the patterns (reference models) and detects any deviation that is potentially dangerous for the information system. What is User Behavior Analytics? User Behavior Analytics is a category of applications that analyzes the user’s behavior and detects abnormal and potentially malicious actions. This behavioral analysis, which can be applied to all users,… Read More >>